This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data.
- Alleged data breach of Neway valve
- Category: Data Breach
- Content: The group claims to have obtained data from the organization.
- Date: 2025-08-07T14:20:11Z
- Network: tor
- Published URL: https://worldleaksartrjm3c6vasllvgacbi5u3mgzkluehrzhk2jz4taufuid.onion/companies/9195577978/overview
- Screenshots:
- Threat Actors: Worldleaks
- Victim Country: USA
- Victim Industry: Manufacturing & Industrial Products
- Victim Organization: neway valve
- Victim Site: newayvalve.com
- Alleged data breach of The Gisborne Group
- Category: Data Breach
- Content: The group claims to have obtained data from the organization.
- Date: 2025-08-07T14:16:32Z
- Network: tor
- Published URL: https://worldleaksartrjm3c6vasllvgacbi5u3mgzkluehrzhk2jz4taufuid.onion/companies/0602516211/overview
- Screenshots:
- Threat Actors: Worldleaks
- Victim Country: Canada
- Victim Industry: Building and construction
- Victim Organization: the gisborne group
- Victim Site: gisborne.com
- Alleged data leak of Disabled Governorates
- Category: Data Leak
- Content: The group claims to have leaked data of Disabled Governorates.
- Date: 2025-08-07T14:13:18Z
- Network: telegram
- Published URL: https://t.me/HACKFIVE3/22
- Screenshots:
- Threat Actors: HACK FIVE
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data breach of Prime Beverage Group
- Category: Data Breach
- Content: The group claims to have obtained data from the organization.
- Date: 2025-08-07T14:12:28Z
- Network: tor
- Published URL: https://worldleaksartrjm3c6vasllvgacbi5u3mgzkluehrzhk2jz4taufuid.onion/companies/5414479604/overview
- Screenshots:
- Threat Actors: Worldleaks
- Victim Country: USA
- Victim Industry: Food & Beverages
- Victim Organization: prime beverage group
- Victim Site: primebev.com
- Alleged data leak of Intelligence Service Prisoners
- Category: Data Leak
- Content: The group claims to have leaked data of Intelligence Service Prisoners.
- Date: 2025-08-07T14:11:15Z
- Network: telegram
- Published URL: https://t.me/HACKFIVE3/22
- Screenshots:
- Threat Actors: HACK FIVE
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data leak of Political Prisoners Foundation
- Category: Data Leak
- Content: The group claims to have leaked data of Political Prisoners Foundation.
- Date: 2025-08-07T14:11:11Z
- Network: telegram
- Published URL: https://t.me/HACKFIVE3/22
- Screenshots:
- Threat Actors: HACK FIVE
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data leak of FRANCENERGIES
- Category: Data Breach
- Content: The threat actor claims to have leaked a database of FRANCENERGIES, allegedly containing personal details of over 60,000 individuals in France. The exposed data includes first and last names, phone numbers, dates of birth, email addresses, physical addresses, postal codes, cities, and country.
- Date: 2025-08-07T14:00:40Z
- Network: openweb
- Published URL: https://breachforums.hn/Thread-DATABASE-FR-France-DB-ENRGIE-60K
- Screenshots:
- Threat Actors: 8080
- Victim Country: France
- Victim Industry: Energy & Utilities
- Victim Organization: francenergies
- Victim Site: francenergies.fr
- Alleged data leak of Federal Intelligence and Investigation Agency
- Category: Data Leak
- Content: The group claims to have leaked data of Federal Intelligence and Investigation Agency.
- Date: 2025-08-07T14:00:17Z
- Network: telegram
- Published URL: https://t.me/HACKFIVE3/22
- Screenshots:
- Threat Actors: HACK FIVE
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data leak of Intelligence database
- Category: Data Leak
- Content: The group claims to have leaked data of Intelligence database.
- Date: 2025-08-07T14:00:03Z
- Network: telegram
- Published URL: https://t.me/HACKFIVE3/22
- Screenshots:
- Threat Actors: HACK FIVE
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data leak of Intelligence database
- Category: Data Leak
- Content: The group claims to have data leak of Intelligence database.
- Date: 2025-08-07T13:55:23Z
- Network: telegram
- Published URL: https://t.me/HACKFIVE3/22
- Screenshots:
- Threat Actors: HACK FIVE
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data leak of Federal Intelligence and Investigation Agency
- Category: Data Leak
- Content: The group claims to have data leak of Federal Intelligence and Investigation Agency.
- Date: 2025-08-07T13:55:21Z
- Network: telegram
- Published URL: https://t.me/HACKFIVE3/22
- Screenshots:
- Threat Actors: HACK FIVE
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data leak of Abroad USA military bases
- Category: Data Leak
- Content: The group claims to have leaked database of Abroad USA military bases. The compromised data contains data about American military bases abroad.
- Date: 2025-08-07T13:33:06Z
- Network: telegram
- Published URL: https://t.me/HACKFIVE3/18?single
- Screenshots:
- Threat Actors: HACK FIVE
- Victim Country: USA
- Victim Industry: Military Industry
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data leak of israel soldiers
- Category: Data Leak
- Content: The group claims to have data leak of israel soldiers.
- Date: 2025-08-07T13:27:50Z
- Network: telegram
- Published URL: https://t.me/HACKFIVE3/21
- Screenshots:
- Threat Actors: HACK FIVE
- Victim Country: Israel
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data leak of Military bases in USA
- Category: Data Leak
- Content: The group claims to have leaked database of Military bases in USA. The compromised data contains name, state, region, geographic coordinates.
- Date: 2025-08-07T13:23:07Z
- Network: telegram
- Published URL: https://t.me/HACKFIVE3/18?single
- Screenshots:
- Threat Actors: HACK FIVE
- Victim Country: USA
- Victim Industry: Military Industry
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data breach of Israel Ministry of Tourism
- Category: Data Breach
- Content: The group claims to have data breach of Israel Ministry of Tourism.
- Date: 2025-08-07T13:11:11Z
- Network: telegram
- Published URL: https://t.me/HACKFIVE3/21
- Screenshots:
- Threat Actors: HACK FIVE
- Victim Country: Israel
- Victim Industry: Government Administration
- Victim Organization: israel ministry of tourism
- Victim Site: gov.il
- Alleged data breach of Israel Ministry of Tourism
- Category: Data Breach
- Content: The group claims to have data leak of Israel Ministry of Tourism.
- Date: 2025-08-07T12:53:55Z
- Network: telegram
- Published URL: https://t.me/HACKFIVE3/21
- Screenshots:
- Threat Actors: HACK FIVE
- Victim Country: Israel
- Victim Industry: Government Administration
- Victim Organization: israel ministry of tourism
- Victim Site: gov.il
- Alleged data sale of EkKalvi
- Category: Data Breach
- Content: The threat actor claims to be selling data of over 3.8 million from EkKalvi on July 2023. The exposed data reportedly includes sensitive personal information such as full names, dates of birth, Aadhaar numbers, caste, and religion of students and teachers, along with academic scores, school details, and GPS logs.
- Date: 2025-08-07T12:47:48Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Selling-%F0%9F%87%AE%F0%9F%87%B3-India-NGO-Mega-Breach-%E2%80%94-3-8M-Records-from-Rise-Infinity-Foundation-EkKalvi
- Screenshots:
- Threat Actors: Chucky_BF
- Victim Country: India
- Victim Industry: Non-profit & Social Organizations
- Victim Organization: ekkalvi
- Victim Site: ekkalvi.org
- Alleged data sale of Rise Infinity Foundation
- Category: Data Breach
- Content: The threat actor claims to be selling data of over 3.8 million records Rise Infinity Foundation on July 2023. The exposed data reportedly includes sensitive personal information such as full names, dates of birth, Aadhaar numbers, caste, and religion of students and teachers, along with academic scores, school details, and GPS logs.
- Date: 2025-08-07T12:47:33Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Selling-%F0%9F%87%AE%F0%9F%87%B3-India-NGO-Mega-Breach-%E2%80%94-3-8M-Records-from-Rise-Infinity-Foundation-EkKalvi
- Screenshots:
- Threat Actors: Chucky_BF
- Victim Country: India
- Victim Industry: Non-profit & Social Organizations
- Victim Organization: rise infinity foundation
- Victim Site: riseinfinity.org
- Alleged data leak of American Wireless
- Category: Data Leak
- Content: The group claims to have leaked 81 M database of American Wireless Database (2018 – 2019).
- Date: 2025-08-07T12:42:10Z
- Network: telegram
- Published URL: https://t.me/HACKFIVE3/18?single
- Screenshots:
- Threat Actors: HACK FIVE
- Victim Country: USA
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- K14M_69_NEWS targets the website of Baghaiakandi Kalimullah High School
- Category: Defacement
- Content: The group claims to have defaced the website of Baghaiakandi Kalimullah High School.
- Date: 2025-08-07T12:27:35Z
- Network: telegram
- Published URL: https://t.me/K14M_69/24
- Screenshots:
- Threat Actors: K14M_69_NEWS
- Victim Country: Bangladesh
- Victim Industry: Education
- Victim Organization: baghaiakandi kalimullah high school
- Victim Site: bkkhs.edu.bd
- Alleged unauthorized access to the boiler system in Lithuania
- Category: Initial Access
- Content: The group claims to have compromised the security system of a boiler room in Lithuania. The group claims they have control over all three boilers and ability to trigger and reset system errors, disable alarms, allowing to hide faults from operators.
- Date: 2025-08-07T12:01:38Z
- Network: telegram
- Published URL: https://t.me/Z_alliance_ru/802
- Screenshots:
- Threat Actors: Z-ALLIANCE
- Victim Country: Lithuania
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data leak from 18 Indian Private Companies
- Category: Data Leak
- Content: The threat actor claims to have leaked employee data from 18 private Indian companies, offering it completely free. The data includes names, DOBs, emails, phone numbers, and employment details (EmpCode, DOJ, DOL, etc.) across sectors like tech, finance, pharma, and consulting. The affected companies are: BE Pharmaceuticals, Carrier Midea India, Coro India, DB Infomedia, Fincity Technology, Forrester Research India, Guavas Network System, Infotel Group, Invest India, Jumbo Electronics, Koovs Marketing, Nivalink Tours, OLF India Software, Pinpoint India, Safenet Infotech, Solar OM Global, Syntec Technology, and Technopak Advisor.
- Date: 2025-08-07T11:50:57Z
- Network: openweb
- Published URL: https://breachforums.hn/Thread-LEAK-INDIA-s-18-PRIVATE-COMPANIES-EMPLOYEE-DATA
- Screenshots:
- Threat Actors: LionDataMarket
- Victim Country: India
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data leak of ENNEA
- Category: Data Breach
- Content: The threat actor has allegedly leaked a batch of credentials related to ENNEA from South Korea. The leak contains email and plaintext password pairs associated with various Korean domains.
- Date: 2025-08-07T11:49:11Z
- Network: openweb
- Published URL: https://breachforums.hn/Thread-enneacounsel-com-KOREA
- Screenshots:
- Threat Actors: DubleDump
- Victim Country: France
- Victim Industry: Information Technology (IT) Services
- Victim Organization: ennea
- Victim Site: enneacounsel.com
- Alleged data sale of Vitalis
- Category: Data Breach
- Content: The threat actor claims to be selling 202,579 customer support records from Vitalis.fr, a France-based automotive service provider. The exposed dataset, dated March 2025 and sized at 10MB, allegedly includes full names, contact emails, phone numbers (mobile/landline), internal reference IDs, and detailed company and service site information.
- Date: 2025-08-07T11:48:59Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Selling-%F0%9F%87%AB%F0%9F%87%B7-Vitalis-fr-Customer-Support-Data-Leak-%E2%80%94-202K-Records-with-Emails-Phones
- Screenshots:
- Threat Actors: Chucky_BF
- Victim Country: France
- Victim Industry: Automotive
- Victim Organization: vitalis
- Victim Site: vitalis.fr
- Alleged data sale of Bébé9
- Category: Data Breach
- Content: The threat actor claims to be selling the complete internal database of Bébé9. The compromised data, sized at 1.34GB and containing millions of records, includes customer transaction data, client profiles (with addresses, birth dates, and loyalty points), sales and invoice records, promotional product data, inventory and supplier information, support interaction logs, user tracking, chat logs, and more.
- Date: 2025-08-07T11:48:51Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Selling-%F0%9F%87%AB%F0%9F%87%B7-Bebe9-com-1-34GB-Leak-%E2%80%94-Full-Baby-Product-Retailer-Database-Exposed
- Screenshots:
- Threat Actors: Chucky_BF
- Victim Country: France
- Victim Industry: Retail Industry
- Victim Organization: bébé9
- Victim Site: bebe9.com
- OverFlame targets the website of in-dubno.at.ua
- Category: Defacement
- Content: The group claims to defaced the website of in-dubno.at.ua.
- Date: 2025-08-07T11:04:49Z
- Network: telegram
- Published URL: https://t.me/privetOTof223/261
- Screenshots:
- Threat Actors: OverFlame
- Victim Country: Ukraine
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: in-dubno.at.ua
- Alleged sale of admin access to a retail organization in the USA
- Category: Initial Access
- Content: The threat actor is offering to sell admin access to a retail organization in the USA.
- Date: 2025-08-07T10:54:18Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/263864/
- Screenshots:
- Threat Actors: Big-Bro
- Victim Country: USA
- Victim Industry: Retail Industry
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of RDWeb admin access to organization in the UK
- Category: Initial Access
- Content: The threat actor is offering to sell RDWeb admin access to an organization in the United Kingdom.
- Date: 2025-08-07T10:43:45Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/263855/
- Screenshots:
- Threat Actors: Big-Bro
- Victim Country: UK
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of unauthorized admin access to commercial organization in Canada
- Category: Initial Access
- Content: The threat actor is offering to sell admin access to a commercial organization in Canada.
- Date: 2025-08-07T10:36:42Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/263857/
- Screenshots:
- Threat Actors: Big-Bro
- Victim Country: Canada
- Victim Industry: Commercial Real Estate
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data sale of France Solar
- Category: Data Breach
- Content: The threat actor claims to be selling data from France Solar, exposing over 339,811 records in a 121MB file. The compromised dataset allegedly includes appointment information, client contact details (names, emails, phone numbers, addresses), authentication logs with IPs and timestamps, funding and legal documents, pricing quotes, product lists, order statuses, and user notifications.
- Date: 2025-08-07T10:36:19Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Selling-France-Solar-Internal-Exposure-%E2%80%93-121MB-of-Green-Energy-Client-Data-Leaked-2025
- Screenshots:
- Threat Actors: Chucky_BF
- Victim Country: France
- Victim Industry: Energy & Utilities
- Victim Organization: france solar
- Victim Site: france-solar.fr
- Alleged data sale of Monetizze
- Category: Data Breach
- Content: The threat actor claims to be selling a database from Monetizze, containing over 200,000 records of 720 MB.
- Date: 2025-08-07T10:36:12Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Selling-Brazil-130k-Name-Phone-Mail-Password-Hash-CPF-Address-CEP-monetizze-com-br
- Screenshots:
- Threat Actors: Arikos
- Victim Country: Brazil
- Victim Industry: E-commerce & Online Stores
- Victim Organization: monetizze
- Victim Site: monetizze.com.br
- Alleged data leak of Tech Trivial
- Category: Data Breach
- Content: The threat actor claims to have leaked the client database of Tech Trivial, a supplier of plastic and cable testing equipment. The exposed data includes client names, email addresses, plaintext passwords, phone numbers, and registration dates.
- Date: 2025-08-07T10:36:04Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-DATABASE-Tech-Trivial-Plastic-Cable-Test-Equipment-Suppliers-techtrivial-com-Leaownloa
- Screenshots:
- Threat Actors: N1KA
- Victim Country: India
- Victim Industry: Manufacturing
- Victim Organization: tech trivial
- Victim Site: techtrivial.com
- Alleged data leak of Direct Assurance
- Category: Data Breach
- Content: The threat actor claims to have leaked over 15,240 records from Direct Assurance France, exposing full names with honorifics, emails, mobile phone numbers, physical addresses (including ZIP codes), dates of birth, and precise regional targeting data.
- Date: 2025-08-07T09:42:14Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Selling-%F0%9F%87%AB%F0%9F%87%B7-Direct-Assurance-France-%E2%80%94-15K-Full-Profiles-Email-Phone-Address-DOB
- Screenshots:
- Threat Actors: Chucky_BF
- Victim Country: France
- Victim Industry: Insurance
- Victim Organization: direct assurance
- Victim Site: direct-assurance.fr
- Alleged Breach of Iranian Ministry of Defense
- Category: Data Breach
- Content: The threat actor claims to have leaked the database of Iranian Ministry of Defense, exposing highly classified military documents allegedly include original blueprints of advanced warplanes, submarines, ballistic missiles, drones, and electronic warfare systems.
- Date: 2025-08-07T09:32:49Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Selling-%F0%9F%91%BDSelling-confidential-blueprints-from-the-Iranian-Ministry-of-Defense-%F0%9F%91%BD
- Screenshots:
- Threat Actors: HvcKMvsoneria33
- Victim Country: Iran
- Victim Industry: Government Administration
- Victim Organization: iranian ministry of defense
- Victim Site: mod.ir
- Alleged data leak of USA sub-domains
- Category: Data Leak
- Content: The group claims to have leaked data of USA sub-domains.
- Date: 2025-08-07T09:15:09Z
- Network: telegram
- Published URL: https://t.me/ruskinet/200
- Screenshots:
- Threat Actors: RuskiNet
- Victim Country: USA
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data leak of USA military
- Category: Data Leak
- Content: The group claims to have leaked data of USA military.
- Date: 2025-08-07T09:14:22Z
- Network: telegram
- Published URL: https://t.me/ruskinet/198
- Screenshots:
- Threat Actors: RuskiNet
- Victim Country: USA
- Victim Industry: Defense & Space
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data leak of US military
- Category: Data Leak
- Content: The group claims to have data leak of US military.
- Date: 2025-08-07T08:58:05Z
- Network: telegram
- Published URL: https://t.me/ruskinet/198
- Screenshots:
- Threat Actors: RuskiNet
- Victim Country: USA
- Victim Industry: Defense & Space
- Victim Organization: us military
- Victim Site: Unknown
- Alleged data leak of Dobrotsen
- Category: Data Breach
- Content: The threat actor claims to have leaked a database from Dobrotsen. The data contains 10,000 records including customer emails, phone numbers, names, hashed passwords, and location data.
- Date: 2025-08-07T08:54:04Z
- Network: openweb
- Published URL: https://breachforums.hn/Thread-DATABASE-Discount-stores-dobrotsen-ru-partial
- Screenshots:
- Threat Actors: Dr0xKrueger
- Victim Country: Russia
- Victim Industry: Retail Industry
- Victim Organization: dobrotsen
- Victim Site: dobrotsen.ru
- Alleged access sale of CARFAX for Police
- Category: Initial Access
- Content: The threat actor claims to sell unauthorized access to CARFAX for Police, enabling unlimited vehicle and license plate searches. The access allows tracking of ownership, crash reports, and real-time VIN alerts, including partial plate searches.
- Date: 2025-08-07T08:20:29Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Selling-US-CarFax-Law-Enforcement-Police-Plate-search-Account-Access
- Screenshots:
- Threat Actors: Governer
- Victim Country: USA
- Victim Industry: Law Enforcement
- Victim Organization: carfax for police
- Victim Site: carfaxforpolice.com
- Alleged data leak of USA government
- Category: Data Leak
- Content: The group claims to have leaked data of USA government.
- Date: 2025-08-07T08:18:47Z
- Network: telegram
- Published URL: https://t.me/ruskinet/197
- Screenshots:
- Threat Actors: RuskiNet
- Victim Country: USA
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data leak of Travelodge
- Category: Data Breach
- Content: The threat actor claims to have leaked a database containing 16 million records from Travelodge.
- Date: 2025-08-07T08:10:55Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-UK-Travel–22389
- Screenshots:
- Threat Actors: error_fixed
- Victim Country: UK
- Victim Industry: Hospitality & Tourism
- Victim Organization: travelodge
- Victim Site: travelodge.co.uk
- Alleged data leak of USA ID-Verified Stripe Express Account
- Category: Data Leak
- Content: The threat actor claims to be leaked USA ID-verified Stripe Express account.
- Date: 2025-08-07T06:15:42Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/263847/
- Screenshots:
- Threat Actors: sky88
- Victim Country: USA
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data breach of SATUSEHAT
- Category: Data Breach
- Content: The threat actor claims to be selling a leaked patient database from the SatuSehat Kotim Kabupaten system in Indonesia, covering records from 2020 to 2025. The data appears to include sensitive personal and medical information such as medical record numbers, BPJS (national health insurance) IDs, names, genders, medical departments (e.g., UGD, KIA), and timestamps.
- Date: 2025-08-07T05:55:56Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-DATABASE-SatuSehat-Kotim-Kabupaten-Patient-Data-BPJS-Exposed-2020-2025
- Screenshots:
- Threat Actors: bitElliot
- Victim Country: Indonesia
- Victim Industry: Government Administration
- Victim Organization: satusehat
- Victim Site: satusehat.kemkes.go.id
- Alleged data breach of Old Laboratorians Association (OLsA)
- Category: Data Breach
- Content: The threat actor claims to have leaked a Bangladeshi membership database from laboratorians.net. The data includes names, lab IDs, email addresses, phone numbers, membership types, and batch years, primarily belonging to individuals labeled as Life members.
- Date: 2025-08-07T04:33:30Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-DATABASE-Country-Bangladesh-Free-DB-laboratorians-net
- Screenshots:
- Threat Actors: RainbowDF
- Victim Country: Bangladesh
- Victim Industry: Public Relations/PR
- Victim Organization: old laboratorians association (olsa)
- Victim Site: laboratorians.net
- Alleged data breach of Quy Nhon University
- Category: Data Breach
- Content: The threat actor claims to have breached the website of Quy Nhon University (qnu.edu.vn), leaking a substantial amount of detailed student data. The compromised records include student IDs, plaintext passwords, full names, birthdates, genders, photos, academic history, addresses, contact details, religious affiliations, and family information. The dataset also contains sensitive education-related metadata such as testing scores, enrollment status, program names, class names, and disciplinary outcomes like expulsion or graduation.
- Date: 2025-08-07T04:07:20Z
- Network: openweb
- Published URL: https://breachforums.hn/Thread-Website-qnu-edu-vn
- Screenshots:
- Threat Actors: Ls1jWohGKtwY0iZ2yU
- Victim Country: Vietnam
- Victim Industry: Higher Education/Acadamia
- Victim Organization: quy nhon university
- Victim Site: qnu.edu.vn
- Alleged leak of emails and password from eBay and Best Buy
- Category: Data Leak
- Content: The threat actor claims to be selling a database containing a total of over 144,000 email and password combinations allegedly from e-commerce platforms eBay and BestBuy. The dataset includes 125,824 lines from eBay and 18,381 lines from BestBuy.
- Date: 2025-08-07T03:57:09Z
- Network: openweb
- Published URL: https://breachforums.hn/Thread-Ebay-BestBuy-Data-On-Sale
- Screenshots:
- Threat Actors: MistX
- Victim Country: USA
- Victim Industry: E-commerce & Online Stores
- Victim Organization: ebay
- Victim Site: ebay.com
- Alleged data breach of ISS-MSN 2025
- Category: Data Breach
- Content: Threat actor claims to be selling data allegedly obtained from the Malaysian Society of Neurosciences (MSN), in collaboration with the Infantile Seizure Society (ISS) website, issmsn2025.com, following a breach on August 6, 2025, via admin panel credentials. The actor offers full admin login access and states that the compromised dataset includes various Excel files containing sensitive user and organizational information. Exposed records reportedly cover user IDs, names, emails, phone numbers, IC numbers, addresses, institutions, payment details, abstract submissions, faculty member profiles, order histories, survey responses, and more.
- Date: 2025-08-07T03:44:13Z
- Network: openweb
- Published URL: https://breachforums.hn/Thread-issmsn2025-com-Malaysian-Society-of-Neurosciences-MSN
- Screenshots:
- Threat Actors: Explorers
- Victim Country: Malaysia
- Victim Industry: Research Industry
- Victim Organization: iss-msn
- Victim Site: issmsn2025.com
- Alleged sale of INTELLIGENCE SECURITY BOT tool
- Category: Malware
- Content: The threat actor claims to be selling a free Telegram-based tool called INTELLIGENCE SECURITY BOT, positioned as an alternative to IntelX.io. This bot offers automated OSINT and credential intelligence features, including subdomain and credential discovery, stealer log analysis, cookie searches, and direct IntelX-style data retrieval using emails, URLs, credit cards, and more. The bot operates 24/7, uses licensed APIs, and provides frequent updates.
- Date: 2025-08-07T03:18:41Z
- Network: openweb
- Published URL: https://breachforums.hn/Thread-ALTERNATIVE-INTELX-IO-FREE-BEST-BOT-INTELLIGENCE-SECURITY-FREE
- Screenshots:
- Threat Actors: osintsearchbot
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data breach of Moscow Metro
- Category: Data Breach
- Content: The threat actor claim to be a leaked dataset related to Russia’s Troika metro card system. The data includes personal details of customers names, phone numbers, emails, order dates, and pickup locations for Troika card orders at various Moscow Metro stations.
- Date: 2025-08-07T01:26:38Z
- Network: openweb
- Published URL: https://breachforums.hn/Thread-Russia-Troika-cards-metro-system
- Screenshots:
- Threat Actors: anonimwindows
- Victim Country: Russia
- Victim Industry: Transportation & Logistics
- Victim Organization: moscow metro
- Victim Site: transport.mos.ru
Conclusion The incidents detailed in this report highlight a diverse and active landscape of cyber threats. Data breaches and leaks are prominent, affecting various sectors from education and gaming to healthcare and automotive, and impacting countries including Bangladesh, Mexico, Malaysia, India, Indonesia, France, Brazil, and Israel. The compromised data ranges from personal user information and credit card details to sensitive patient records, classified military components, and large customer databases. Beyond data compromise, the report also reveals significant activity in initial access sales, with threat actors offering unauthorized access to banking systems, corporate networks (including RDWeb access to Canadian and UK firms), and even government and military infrastructure like the Royal Thai Air Force and Madrid’s irrigation system. The sale of malware, including penetration testing tools and DDoS tools, further underscores the availability of offensive capabilities in the cyber underground. The incidents collectively demonstrate that organizations across various industries and geographies face persistent threats from data exfiltration, unauthorized network access, and the proliferation of malicious tools. The nature of these incidents emphasizes the critical importance of robust cybersecurity measures, including strong access controls, data protection strategies, continuous vulnerability management, and proactive threat intelligence to defend against a wide array of sophisticated and opportunistic attacks.